Face recognition is a type of biometric software application that can identify a specific
individual in a digital image by analyzing and comparing patterns. It is the process of
identifying an individual using their facial features and expressions.
In this paper we proposed a face recognition system using Stationary Wavelet Transform
(SWT) with Neural Network, the SWT are applied into five levels for feature facial
extraction with probabilistic Neural Network (PNN) , the system produced good results
and then we improved the system by using two manner in Neural Network (PNN) and
Support Vector Machine(SVM) so we find that the system performance is more better
after using SVM where the result shows the performance of the system is better based on
the recognition rate measurement.
The topic of the partnership between the public and private sectors with great interest by researchers around the world after making sure that the process of economic and social development depends on a combination of resources and energies and expertise of both the public and private sectors in the creation and operation of the various projects , the economic development of the growing proved the failure of both sectors in achieving greater economic growth Klaaly separately in many countries , especially developing countries with a socialist approach , led one way or another to adopt most of the countries economic reform programs promoted by international organizations and institutions ( such as the IMF and the World Bank ) of i
... Show MoreUrban land uses are in a dynamic state that varies over time, the city of Karbala in Iraq has experienced functional changes over the past 100 years, as the city is characterized by the presence of significant tourist and socio-economic activity represented by religious tourism, and it occur due to various reasons such as urbanization. The purpose of this study is to apply a Markov model to analyze and predict the behavior of transforming the use of land in Karbala city over time. This can include the conversion of agricultural land, or other areas into residential, commercial, industrial land uses. The process of urbanization is typically driven by population growth, economic development, based on a set of probabilities and transitions bet
... Show MoreAbstractBackgroundLeishmaniasis is endemic in Iraq, where both cutaneous and visceral forms of the disease are reported.ObjectivesTo determine the prevalence of cutaneous leishmaniasis (CL) and to identify associations of CL with age, sex, season, and provinces depending on some demographic and climatic aspects.MethodsThis study is retrospective and includes reported cases of infections using the available surveillance database taken from the Iraqi Ministry of Health for the years 2011, 2012, and 2013 for all provinces of Iraq.ResultsMen and boys were found to be at higher risk for CL compared with women and girls. The majority of cases were recorded among those in age groups 5–14 and 15–45 years old. Most cases were recorded from lowla
... Show MoreThis study aims to formulate azithromycin oleogel to locally treat skin infections such as acne vulgaris and skin wound infection. Providing a form of azithromycin that can be administered topically is highly desired to prevent unwanted systemic complications including diarrhea, nausea, and abdominal pain. Additionally, it will avoid first pass metabolism, improves patient acceptance, provides an alternative in nauseated patients, decreases the dose by direct contact with the pathological site, and provides a noninvasive and convenient mode of administration. Furthermore, for treating wound infections, the gel will act as a scaffold biomaterial for wound closure besides its antibacterial effect. Herein, we propose the use of grapeseed oil-b
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show More